[VRRP] Clear draft-ietf-vrrp-unified-spec 5

Stephen Nadas <stephen.nadas@ericsson.com> Fri, 02 October 2009 15:59 UTC

Return-Path: <stephen.nadas@ericsson.com>
X-Original-To: vrrp@core3.amsl.com
Delivered-To: vrrp@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id AEB163A6963 for <vrrp@core3.amsl.com>; Fri, 2 Oct 2009 08:59:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.598
X-Spam-Level:
X-Spam-Status: No, score=-6.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cLdaTEVinCq8 for <vrrp@core3.amsl.com>; Fri, 2 Oct 2009 08:59:42 -0700 (PDT)
Received: from imr1.ericy.com (imr1.ericy.com [198.24.6.9]) by core3.amsl.com (Postfix) with ESMTP id 6C1603A6853 for <vrrp@ietf.org>; Fri, 2 Oct 2009 08:59:42 -0700 (PDT)
Received: from eusrcmw751.eamcs.ericsson.se (eusrcmw751.exu.ericsson.se [138.85.77.51]) by imr1.ericy.com (8.13.1/8.13.1) with ESMTP id n92G14Gc018210; Fri, 2 Oct 2009 11:01:06 -0500
Received: from eusrcmw750.eamcs.ericsson.se ([138.85.77.50]) by eusrcmw751.eamcs.ericsson.se with Microsoft SMTPSVC(6.0.3790.3959); Fri, 2 Oct 2009 11:00:57 -0500
Received: from eusaamw0712.eamcs.ericsson.se ([147.117.20.181]) by eusrcmw750.eamcs.ericsson.se with Microsoft SMTPSVC(6.0.3790.3959); Fri, 2 Oct 2009 11:00:56 -0500
Received: from EUSAACMS0701.eamcs.ericsson.se ([169.254.1.112]) by eusaamw0712.eamcs.ericsson.se ([147.117.20.181]) with mapi; Fri, 2 Oct 2009 12:00:56 -0400
From: Stephen Nadas <stephen.nadas@ericsson.com>
To: "dromasca@avaya.com" <dromasca@avaya.com>
Date: Fri, 02 Oct 2009 12:00:55 -0400
Thread-Topic: Clear draft-ietf-vrrp-unified-spec 5
Thread-Index: AcpDeYX2uwXDCsT6SVu1uGMy43SgHw==
Message-ID: <450AE4BEC513614F96969DDA34F3593497639BB0@EUSAACMS0701.eamcs.ericsson.se>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_450AE4BEC513614F96969DDA34F3593497639BB0EUSAACMS0701eam_"
MIME-Version: 1.0
X-OriginalArrivalTime: 02 Oct 2009 16:00:56.0683 (UTC) FILETIME=[86E663B0:01CA4379]
Cc: "Radia.Perlman@Sun.COM" <Radia.Perlman@Sun.COM>, "vrrp@ietf.org" <vrrp@ietf.org>
Subject: [VRRP] Clear draft-ietf-vrrp-unified-spec 5
X-BeenThere: vrrp@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Virtual Router Redundancy Protocol <vrrp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/vrrp>, <mailto:vrrp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/vrrp>
List-Post: <mailto:vrrp@ietf.org>
List-Help: <mailto:vrrp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/vrrp>, <mailto:vrrp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 02 Oct 2009 15:59:43 -0000

Hi Dan,

Please see below for the various proposed resolutions.  Are they sufficient to clear the draft?

Thanks,
Steve

Discuss remarks;

1. The version management and transition plan for VRRP is unlear to me. The
Introduction section mentions that this is 'version three (3) of the protocol
and it is based on VRRP (version 2) for IPv4 that is defined in RFC 3768 and on
draft-ieft-vrrp-ipv6-spec-08.txt'. However RFC 3768 does not make the claim to
be VRRPv2, itlooks like this terminology was decided later and is defined here
for the first time. On the other hand draft-ieft-vrrp-ipv6-spec-08.txt which
VRRPv3 is based upon is just an informative reference and is actually an
expired I-D? Should not this document update RFC 3768, and should not at least
part of the migration and coexistence issues in Appendix A be moved to the
Operational Issues section?

   We are changing draft to obsoletes 3768.

        If we move the below from appendix A to operational issues, will  that work for this item?

   VRRPv3 support of VRRPv2

                 VRRPv2 and VRRPv3 interoperation is optional. Mixing
            VRRPv2 and VRRPv3 should only be done when
            transitioning from VRRPv2 to VRRPv3. Mixing the two
            versions should not be considered a permanent
            solution.

         An implementation MAY implement a configuration flag that
         tells it to listen for and send both VRRPv2 and VRRPv3
         advertisements.

         When configured this way and the Master, it MUST send both
         types at the configured rate, even if sub-second.

         When configured this way and the Backup, it should time out
         based on the rate advertised by the master; in the case of a
         VRRPv2 master this means it must translate the timeout value
         it receives (in seconds) into centi-seconds.  Also, a backup
         should ignore VRRPv2 advertisements from the current master if
         it is also receiving VRRPv3 packets from it.  It MAY report
         when a v3 master is *not* sending v2 packets: that suggests
         they don't agree on whether they're supporting v2 routers.

2. I do not understand what is the logic of including a section 9 'Operation
over FDDI, Token Ring, and ATM LANE' in this document. Has anybody heard about
a deployment of any of these layer 2 networks lately, and with VRRP atop of
them?

This is moved to an appendix with the rationale that some future L2 may come someday and this thinking may be useful.  It seems not to hurt anything to keep is as appendix.

3. Accept_Mode defaulting to false seems unrealistic at least in deployments
I've seen.  Using accept-data config knob seems very common. Unless enable
Accept_Mode, when the virtual address moves to the Backup, the virtual address
no longer responds to ping; I've also seen an implementation to reject pings to
the virtual IP when it's in Master mode, but this seems like an implementation
bug if so (I'd like a confirmation if this is the case).

In any case, this restriction makes troubleshooting and deployment a pain;
hosts and management systems often ping the gateway address to see if the
network is working, and this kills that assumption.

Unless the WG has recently discussed and reached consensus that Accept_Mode
should still default to false, I'd consider revisiting this position.

We are thinking that accept_mode needs a configuration control and that the default vaule could be an implementation choice.  This is TBD on the list.